Posted: 2021-06-03 06:36:47 Source: http://www.kernel.org/
Version: | 4.14.235 (longterm) |
---|---|
Released: | 2021-06-03 |
Source: | linux-4.14.235.tar.xz |
PGP Signature: | linux-4.14.235.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-4.14.235 |
Posted: 2021-06-03 06:23:55 Source: http://www.kernel.org/
Version: | 4.9.271 (longterm) |
---|---|
Released: | 2021-06-03 |
Source: | linux-4.9.271.tar.xz |
PGP Signature: | linux-4.9.271.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-4.9.271 |
Posted: 2021-06-03 06:22:36 Source: http://www.kernel.org/
Version: | 4.4.271 (longterm) |
---|---|
Released: | 2021-06-03 |
Source: | linux-4.4.271.tar.xz |
PGP Signature: | linux-4.4.271.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-4.4.271 |
Posted: 2021-06-02 19:56:02 Source: https://linuxhint.com/power-supply-for-gaming-computers/
One way to determine the reliability of your system's performance is through PSU. Thus, you have to choose your power supply wisely that can secure your PC components in case of power outages. This article will help you choose with our top PSU picks available and offered in the market.
Posted: 2021-06-02 19:39:14 Source: https://linuxhint.com/best-stylish-pc-inverted-cases/
An inverted PC case comes with an inverse layout, which means all the components installed inside it face upside down, which is the opposite of the conventional way of installing hardware. All your I/O ports will be at the bottom in the inverse layout, whereas all the expansion slots are at the top. The top 5 Stylish PC Inverted Cases are reviewed in this article.
Posted: 2021-06-02 17:43:43 Source: https://linuxhint.com/different-kubernetes-services/
A service in Kubernetes is an abstraction that describes a collection of conceptual pods in which an application runs and an access policy for these kinds of pods. If a pod has to connect with some other pod, it must first determine its IP address. The Kubernetes services also provide a way to find certain pods. The different types of services in Kubernetes are explained in this article.
Posted: 2021-06-02 16:01:54 Source: http://distrowatch.com/11266
NixOS is an independently developed GNU/Linux distribution that aims to improve the state of the art in system configuration management. In NixOS, the entire operating system, including the kernel, applications, system packages and configuration files, are built by the Nix package manager. The distribution's latest release is NixOS....
Posted: 2021-06-02 15:50:43 Source: https://www.youtube.com/watch?v=K6nq-5N6d68
Posted: 2021-06-02 15:09:01 Source: https://linuxhint.com/the-linux-cal-command/
Sometimes, you might want to have a peek at the year’s calendar or even narrow it down to a month’s calendar. The Linux cal command is an excellent built-in tool that displays a calendar of a given year or month depending on the options passed. The Linux cal command is explained in this article.
Posted: 2021-06-02 14:07:26 Source: https://linuxhint.com/scp-command/
This article provides an easy step-by-step guide on how to use the SCP command properly. It is a command that securely copy files to and from a remote system over the SSH protocol. The Linux SCP command is a convenient and secure way of transferring files between two remote nodes.
Posted: 2021-06-02 13:20:08 Source: http://distrowatch.com/11265
The openSUSE team have announced the release of a minor update to the project's 15.x branch. openSUSE 15.3 is assembled using the same binary packages as SUSE Linux Enterprise (SLE) which facilitates testing and migration across both platforms. "The newest minor version of openSUSE Leap is the most....
Posted: 2021-06-02 06:48:19 Source: http://www.kernel.org/
Version: | next-20210602 (linux-next) |
---|---|
Released: | 2021-06-02 |
Posted: 2021-06-02 06:05:05 Source: https://www.linuxjournal.com/content/live-patching-requires-reproducible-builds-and-containers-are-answer
We know that live patching has real benefits because it significantly reduces the downtime associated with frequent patching. But live patching is relatively difficult to achieve without causing other problems and for that reason live patching is not implemented as frequently as it could be. After all, the last thing sysadmins want is a live patch that crashes a system.
Reproducible builds are one of the tools that can help developers to implement live patching consistently and safely. In this article, I explain why reproducible builds matter for live patching, what exactly reproducible builds are, and how containers are coming to the rescue.
Patching is a critical part of systems maintenance because patching fixes faulty and buggy code. More importantly, security teams rely on patching to plug security holes, and there is a real urgency to it. Waiting for a convenient maintenance window to patch is risky because it leaves an opportunity for hackers to take advantage of an exploit.
It creates a difficult conundrum: maintain high availability but run a security risk, or patch frequently but end up with frustrated stakeholders. Live patching bridges that gap. With live patching, the offending code is swapped out while a process is actively running, without restarting the application or service that depends on that process.
Live patching is not that straightforward to accomplish – the drop-in code must “fit” in a like-for-like manner, or all sorts of unwanted things can happen. Get it wrong, and the application – or entire server – will crash.
The code behind a running process usually comes from a binary executable file – a machine-readable block of code compiled from source code. A kernel, for example, has thousands of source files all compiled into a few binaries.
With live patching, the live patch code must fit in at an exact level. Yes, the binary file containing the patch code will be different from the binary file containing the bad code. Nonetheless, the new code must slot into place precisely and must depend on the same version of imported libraries. The live patch code must also be compiled using the same compiler options and flags. Bit endianness matters too – the binary file must be ordered in exactly the same way.
In principle, all this is achievable – but in practice, it is a challenge. For example, day-to-day system updates often impact libraries. These libraries could be slightly different, in turn producing binaries that are slightly different when compiling code.
Posted: 2021-06-01 21:43:29 Source: https://linuxhint.com/redirect-stdout-and-stderr-to-file/
Redirection captures a program output and sends it as an input to another command or file. The I/O streams can be redirected by putting the n> operator in use, where n is the file descriptor number. For redirecting stdout, we use "1>" and for stderr, "2>" is added as an operator. How to Redirect stdout and stderr to file is explained in this article.
Posted: 2021-06-01 21:40:09 Source: https://linuxhint.com/use-synology-back-up-linux-computer/
This article provides how to use Synology to back up your Linux computer. This tutorial shows how to install the Synology Active Backup for Business app on your Synology NAS and Linux, add a Linux computer to Active Backup, create a backup task, take backups and restore files from backups.
Posted: 2021-06-01 21:38:46 Source: https://linuxhint.com/use-ip-command-debian-10-linux/
IP command is a very incredibly handy tool for network configuration. It is a replacement for the old 'ifconfig' command found on Linux distributions. IP command can be used to manage network interfaces, devices, tunnels, and routing aspects. Network administrators often need this tool for administering a network and troubleshooting errors. How to use the IP command on Debian 10 Linux is explained in this article.
Posted: 2021-06-01 21:37:36 Source: https://linuxhint.com/how-to-implement-ipsec-in-linux/
IPsec is a level 3 secure protocol. It provides security for the transportation layer and superior both with IPv4 and IPv6. The IPSEC works with 2 security protocols and a key management protocol: ESP (Encapsulating Security Payload), AH (Authentication Header), and IKE (Internet Key Exchange). How to implement IPsec in Linux is explained in this article.
Posted: 2021-06-01 21:36:15 Source: https://linuxhint.com/iptables-tutorial/
Iptables is a command-line firewall that filters packets according to the defined rules. With Iptables, users can accept, refuse, or onward connections; it is incredibly versatile and widely used despite being replaced by nftables. Despite being replaced, it remains as one of the most spread defensive and routing software. This article contains Iptables tutorial.
Posted: 2021-06-01 21:35:17 Source: https://linuxhint.com/linear-programming/
Linear programming is a mathematical model which is generally used in data science for optimization. The optimization means we can understand the meaning like maximum profit and less cost. The company or the organization has mainly two main objectives, minimization, and maximization. The minimization means to cut the extra cost which comes in productions to get the maximize profits. Linear Programming is discussed in this article.
Posted: 2021-06-01 21:34:02 Source: https://linuxhint.com/linux-cmp-command-examples/
The “cmp” command in Linux is used to compare the contents of the two files hence reporting whether the two files are identical or different. This command comes with multiple options that can be paired with it to customize its output. In this article, Linux “cmp” Command is explained with examples.